Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 38

IMPACT OF

TECHNOLOGY
Learning objectives:
1. Apply the terms ‘privacy’, ‘legal’, ‘ethical’, ‘environmental’, and ‘cultural’.
2. Explain data legislation, including an organisation’s obligation to protect and
supply data.
3. Explain the term ‘stakeholder’
4. Explain the right to be forgotten
5. Distinguish the differences between legitimate creative uses and clear
infringement of material subject to copyright
Starter activity (5)

● How could the data be lost? School/exam board/networks hacked?

● What might the data include? Medical information, DOB, home address, login details
for educational software, parents’ card numbers

● What could criminals use the data Criminals could change results data, blackmail parents
for? or students, steal identities, make online purchases,
groom students online
2
Activity 1 G Sticky (6)

On a piece of paper, write a possible definition for each


category of impact:

3
Activity 1

Categories of impact
Category Explanation

Legal Technology provides opportunities to criminals. To help protect


people, their data, and their work, several laws have been introduced
in the UK.
Environmental The effect that technology has on the world around us

Cultural How have society been impacted and the ways that we interact?

Ethical Considerations about right and wrong, morality and power

Privacy Once data is put on a computer, it can be easily copied or shared. In


some cases, people have a right to choice in this matter.

4
Activity 1

Which category of impact is this?

Hackers hit A-list law firm of Lady Gaga,


Drake and Madonna

Hackers claim to have 756 gigabytes of data


including contracts and personal emails and are
claiming a ransom for return.

Legal impact example

5
Activity 1

Which category of impact is this?

In 2017, China built a 250-acre solar farm


shaped like a giant panda

The company involved is building 100 farms like


this. Each 100-megawatt solar farm can power
10,000 houses.

Environmental impact example

6
Activity 1

Which category of impact is this?

Digital technology is fuelling a loneliness


epidemic

Though figures show internet use among


older people is increasing, nearly four
million people over 65 [have] never used
the internet (Age UK, 2018).

Cultural impact example

7
Activity 1

Which category of impact is this?

Artificial intelligence: Algorithms face scrutiny


over potential bias

More research into computer algorithms is needed


as they could have gender or race biases, the
government has warned.

It announced independent watchdog the Centre for


Data Ethics and Innovation (CDEI) will investigate
algorithms used in the justice and financial systems.

Ethics impact example

8
Activity 1

Which category of impact is this?

Apple Martin tells off Hollywood actress


mother Gwyneth Paltrow for sharing photo
(of Apple) without consent

Fourteen-year-old Apple Martin publicly


criticised her mother Gwyneth Paltrow for
oversharing, reflecting unease of an entire
generation. The Instagram post was a photo of
her (Apple) with her face largely covered by ski
goggles.

Privacy impact example

9
Activity 2 Video (10)

What are the laws relating to computers?


WATCH THIS VIDEO

Acts of Parliament

● Data Protection Act 2018


● Computer Misuse Act 1990
● Copyright, Designs and Patents Act 1988
● Freedom of Information Act 2000

10
Activity 2

The purpose of the Data


Protection Act (DPA)

The 1998 Data Protection Act was passed by


parliament to control the way that data is
handled and to give legal rights to people
who have information stored about them.

This was then replaced by the updated 2018


act, which further tightened data privacy
laws.

11
Activity 2

Who is the Data Protection Act (DPA) for?

Everyone — we’re all data subjects

That just means that we have data stored about us and have the right to have the
data looked after properly and have the right to see that data. This is called the
‘right of subject access’.

12
Activity 2

Who makes sure that companies stick to the DPA?

Data Controller (DC) and Information Commissioner’s Office (ICO)

The DC is the person who is responsible for ensuring that the organisation stays within
the principles of the Data Protection Act.

The ICO makes sure that the companies keep to the rules, and fines those that don’t,
sometimes heavily.
13
Activity 2

How big are the fines for data breaches?

In 2019, British Airways was fined £183m because it failed to protect the data of
customers.

The ICO said the incident took place after users of British Airways’s website were
diverted to a fraudulent site. Through this false site, details of about 500,000
customers were harvested by the attackers.

14
Activity 2

The principles of the Data Protection Act 2018

1. Personal data must be fairly and lawfully processed


2. Personal data must be obtained for specified, explicit, and legitimate purposes
3. Personal data must be adequate, relevant, and not excessive
4. Personal data must be accurate and up-to-date
5. Personal data must not be kept for longer than is necessary
6. Personal data must be handled in a way that ensures security

In May 2018, the General Data Protection Regulation (GDPR) was established. This is an
EU-wide law that tightened data privacy and has now been implemented in UK law through
the introduction of the Data Protection Act 2018.

15
Activity 1

Here is a list of stakeholders


● Business owners
● Customers
● Employees
● Teachers and students
● Taxpayers
● Benefit recipients
● Users of the National Health Service
● Unions
● Pensioners
● Religious groups…

The general public as a whole…


16
Activity 1

What is a stakeholder?
Stakeholders are groups or individuals who
will be affected by or can change the way
the technology is used.

We are all stakeholders in various ways.

Turn to your partner and discuss who the


stakeholders are on the next slide.

17
Activity 2

Right to be forgotten

The right to be forgotten (part of GDPR) means that an


individual can request that an organisation erases all
their personal data. This right only applies in certain
circumstances, eg the personal data is no longer
necessary for the purpose for which an organisation
originally collected or processed it.

18
19
Activity 3

Copyright, Designs and Patents Act 1988

The Copyright, Designs and Patents Act


1988 exists to protect people’s creations.
When a person creates something, they
own it. What types of creation do you
think it would include?

20
Activity 3

Copyright, Designs and Patents Act 1988

Copyright refers to the legal right of the


owner of intellectual property. In simpler
terms, copyright is the right to copy. This
means that the original creators of
products and anyone they give
authorization to are the only ones with the
exclusive right to reproduce the work

21
Activity 3

Copyright, Designs and Patents Act 1988

Patents is a government authority or


licence conferring a right or title for a set
period, especially the sole right to exclude
others from making, using, or selling
an invention.

22
Activity 3

Copyright, Designs and Patents Act 1988

● A picture, drawing, or photograph


● A recording of music, a television
programme, or a film
● Text (such as a book, article, or report)
● An algorithm (but only once the
source code has been created)

23
Activity 3

When is it legal to copy, publish, distribute, or sell copyrighted


material?

● When you are the copyright holder

● When you have the copyright holder’s permission

● When the copyright holder has chosen to give up their copyright

24
Activity 3

Do you know what Creative Commons (CC) licensing is?

1. What do CC licences help the copyright owner to keep while sharing their work?
(Copyright)

2. What do CC licences allow the copyright owner to specify? (The conditions under
which people can use their work)

3. What would this combination of conditions mean? (The work must not be used
for commercial purposes and should not be changed)

25
Activity 4 video (8)

Open source vs proprietary


What is open source and what are the benefits?

26
Activity 4

Open source vs proprietary — what are the differences?

● Proprietary software cannot be copied/altered (without permission of the copyright


owner)
● Open source software can be modified (provided it remains open source)
● Proprietary software is distributed only as a completed program; the source code is not
available
● Open source software is distributed with its source code

27
Activity 5 video (10)

Computer Misuse Act (CMA) 1990


WATCH THIS VIDEO

28
Activity 2

Computer Misuse Act (CMA) 1990


Illegal access of a computer system is often known as ‘hacking’.

Punishment for breaking this law includes unlimited fines, several years in prison, or
both, depending on how severe the offence is.

In your own words, describe what Schifreen and Gold did wrong.

On the next slide, you will see the three levels of the CMA.

Which level do you think Schifreen and Gold’s actions fall under?

29
Activity 2

Computer Misuse Act 1990 – Summary

CMA s1: Unauthorised access to computer material

CMA s2: Unauthorised access with intent to commit


or facilitate commission of further offences

CMA s3: Unauthorised acts with intent to impair, or


with recklessness as to impairing, operation of
computer, etc

30
Activity 6

The Freedom of Information Act


2000
The Freedom of Information Act was introduced
to give any member of the public the right to
access any information recorded by public sector
organisations. These organisations include:

● Schools
● Councils
● Government departments
● Health trusts and hospitals
● Libraries
● Museums

31
Activity 6

Does the organisation have to respond?

● Requests must be made in writing, either by letter or by email. The


organisation then has 20 working days to provide the information.

● The minimum requirement for a response is that the request is in writing


and the information is already gathered by the organisation. In addition,
there are circumstances (on the next slide) under which organisations do not
have to provide a response.

32
Activity 6

When doesn’t the organisation have to respond?

● It would cost too much or take too much staff time to deal with the request
● The request is vexatious (designed to create annoyance)
● The request repeats a previous request from the same person
● In addition, requests cannot be responded to if they contravene data protection or
GDPR

33
Activity 6

Why is the Freedom of Information Act important?

It promotes social justice. ‘Social justice’ refers to creating an equal society where
everyone is treated fairly and has equal opportunities. Public organisations act on
everyone’s behalf and spend money that belongs to everyone. Therefore, everyone
has a right to know how that organisation operates, and what they spend public funds
on.

34
Activity 6

What do you think happened to the MPs who had been


dishonest in their expenses claims?

The scandal over expenses that erupted in 2009 led to five Labour MPs and two
Conservative peers going to prison. A number of others had to repay money because
their claims were borderline fraudulent or unfair.

There are many other examples of revelations that were in the public interest:

Unanswered 101 calls


A&E ambulance delays
MOT failures

35
Plenary

Lesson 3: The FIA and the CMA

Quick quiz:
1. What years are the FIA and CMA from respectively?
2. Who can put forward FIA requests?
3. What type of organisation has to answer FIA requests?
4. Are you breaking the CMA if you just look and don’t damage anything? Why?
5. What type of punishment can being convicted of the top level of CMA result in?

36
Plenary

Lesson 3: The FIA and the CMA

Quick quiz – Answers:


1. FIA is from 2000 and CMA is from 2000
2. Any member of the public
3. A public organisation
4. Yes, you are, because level 1 is just accessing, and level 2 is accessing with
intention to commit further offences
5. Unlimited fines, several years in prison, or both, depending on how severe the
offence is

37
Plenary

How does technology impact us?

Three things I have learnt:

Two things I already knew:

One question I still have:

38

You might also like